多項(xiàng)選擇題Which three statements are true about TACACS+?()

A.It is a Cisco proprietary protocol.
B.It runs on TCP port 59. .
C.Authentication and authorization are done at different stages.
D.TACACS+ encrypts the entire body of the packet, but leaves a standard TACACS+ header.
E.It is an industry standard protocol.
F.TACACS+ encrypts both the entire body of the packet and the TACACS+ header.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題What is Phantom RP used for?()

A.it is used for load balancing in bidirectional PIM
B.it is used for redundancy in bidirectional PIM
C.it is used for redundancy in PIM-SM
D.it is used for load balancing in PIM-SM

2.單項(xiàng)選擇題

Refer to the exhibit. Look at the command output. What can you use to prevent this behavior? ()

A. UDLD  (UniDirectional Link Detection)
B. spanning-tree loopguard
C. VTP mode transparent
D. switchport mode desirable

3.單項(xiàng)選擇題Which IGMPv2 message contains a non-zero "Max Response Time"?()

A.Membership Query
B.Membership Report
C.Membership Delay
D.Backward Compatible IGMPv1 Report Message

4.單項(xiàng)選擇題Apart from interdomain multicast routing, what else is MSDP used for?()

A.Source Specific Multicast and IGMPv2
B.Announcing multicast sources to BGP speakers
C.Anycast RP
D.Intradomain multicast routing

5.單項(xiàng)選擇題

Refer to the exhibit. Look at the command output. Assume that there is no other path, and the configuration is correct. What would be the consequences of this situation?()

 

A. Users in SW1 can ping SW2 but not vice versa.
B. Users in SW2 can ping SW1 but not vice versa.
C. Users in SW1 and SW2 can ping each other.
D. Users in SW1 and SW2 cannot ping each other.

最新試題

All of these are fundamental building blocks of differentiated services Traffic Conditioner Block exceptwhich one?()

題型:?jiǎn)雾?xiàng)選擇題

Which of these statements about penultimate hop popping are true?()

題型:多項(xiàng)選擇題

Spanning Tree Protocol IEEE 802.1 s defines the ability to deploy which of these?()

題型:?jiǎn)雾?xiàng)選擇題

The classic Spanning Tree Protocol (802.1 D 1998) uses which sequence of variables to determine thebest received BPDU?()

題型:?jiǎn)雾?xiàng)選擇題

What is true about Unicast RPF in strict mode?()

題型:?jiǎn)雾?xiàng)選擇題

You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()

題型:?jiǎn)雾?xiàng)選擇題

Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()

題型:?jiǎn)雾?xiàng)選擇題

Which of the following is true about the MPLS header and its EXP field size?()

題型:?jiǎn)雾?xiàng)選擇題

Based on the exhibit presented. What will be the objective of this route map when applied to traffic passing through a router?()

題型:?jiǎn)雾?xiàng)選擇題

Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()

題型:?jiǎn)雾?xiàng)選擇題